Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.5.1055

Development of LMS Evaluation Index for Non-Face-to-Face Information Security Education  

Lee, Ji-Eun (Hanyangcyber University)
Abstract
As face-to-face education becomes difficult due to the spread of COVID-19, the use of e-learning content and virtual training is increasing. In the case of information security education, practice to learn response techniques is important, so simulation hacking and vulnerability analysis activities have been supported as virtual training for a long time. In order to increase the educational effect, contents should be designed similar to real situation, and learning activities to achieve the learning goals should be designed. In addition, excellent functions and scalability of the system supporting learning activities are required. The researcher developed an LMS evaluation index that supports non-face-to-face education by considering the key elements of non-face-to-face education and training. The developed evaluation index was applied to the information security education platform to verify its practical utility.
Keywords
Non-face-to-face; Information security education; LMS; Evaluation index;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Jong-Yeon Lee and Eunjin Lee, "Influence Analysis of System, Information and Service Qualities on Learner Satisfaction in University e-Learning," Journal of Educational Studies, 41(3), pp. 119-147, 2010.
2 Sungho Kwon, Sunhee Bhang, June Lee and Seungyeon Han, "A Study on Utilization of e-learning in General Education at University Level : Focus on Contents Sharing among Universities," Korea Journal of General Education, 6(1), pp. 9-32, 2012.
3 Kang, Young-Mook and Lee, Sang-Jin, "A Study On Malicious Mail Training Model," Journal of the Korea Institute of Information Security and Cryptology, 30(2), pp. 197-212, 2020.   DOI
4 W. H., DeLone, E. R. McLean, "Information Systems Success: The Quest for the Dependent Variable," Information Systems Research, vol. 3, no. 1, pp. 60-95, Mar. 1992.   DOI
5 Jeon, Jeong Hoon, "Study on the college curriculum for systematic education of the domestic information security," Korea Information Assurance Society, 16(4), pp. 35-41. 2016.
6 W. K. Horton, E-learning by design. San Francisco, CA: Pfeiffer, 2006.
7 Dong-woo Kim, Seung-woan Chai and Jae-cheol Ryou, "A Study on Domestic Information Security Education System," Journal of the Korea Institute of Information Security and Cryptology, 23(3), pp. 545-559, 2013.   DOI
8 Joe Su-san and Ju Rachel, "A Study of Factors Affecting University Students' Learning Flow in Overall Distance Learning Situation: The Moderating Effect of Coronavirus Anxiety," Journal of Korean Association for Educational Information and Media, 26(4), pp. 909-934, 2020.   DOI
9 C. H. Lawshe, "A quantitative approach to content validity," Personeel psychology, vol. 28, no. 4, pp. 563-575, Winter, 1975.   DOI
10 Cheolil Lim, Hyeongjong Han, Daeun Jung, Yunus Emre Ozturk and Junghyun Hong, "Exploring an e-learning Platform Prototype for Supporting Learning Design," Journal of educational technology, 33(4), pp. 799-837, 2017.   DOI
11 Wee, Young-eun, Hyojung Jung and Jung-Yeon Lim, "Development of flipped learning-based educational model for vocational education and training," The Journal of the Korea Contents Association, 19(1), pp. 37-46, Jan. 2019.   DOI
12 Moon-Bong Lee and Jong-Weon Kim, "Exploring the Success Factors of the e-Learning Systems," The Journal of information systems, 15(4), pp. 171-188, 2006.
13 L. F Pitt, R. T. Watsonm, C. B. Kavan, "Service quality: a measure of information systems effectiveness," MIS Quarterly, vol. 19, no. 2, pp. 173-187, Jun. 1995.   DOI
14 W. H., DeLone, E. R. McLean, "The DeLone and McLean Model of Information Systems Success: a Ten-Year Update," Journal of Management Information Systems, vol. 19, no. 4, pp. 9-30, 2003.   DOI
15 Shin, Weon and Cho, Sung-Mok, "Information security education plan adopting virtualization technology," The Korea Institute of Information Security and Cryptology, 19(1), pp. 59-66, Feb. 2009.